Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/auisc/auisc2011.bht:"
@inproceedings{DBLP:conf/auisc/AgnesseP11, author = {Andrea Agnesse and Marco Pedicini}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Cube Attack in Finite Fields of Higher Order}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {9--14}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Agnesse.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AgnesseP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BaiK11, author = {Yun Bai and Khaled M. Khan}, editor = {Colin Boyd and Josef Pieprzyk}, title = {A Modal Logic for Information System Security}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {51--56}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Bai.html}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/BaiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/CampbellCL11, author = {Scott Campbell and Steve Chan and Jason Lee}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Detection of Fast Flux Service Networks}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {57--66}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Campbell.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/CampbellCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/CorneyMC11, author = {Malcolm Corney and George M. Mohay and Andrew J. Clark}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Detection of Anomalies from User Profiles Generated from System Logs}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {23--32}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/KaosarPY11, author = {Md. Golam Kaosar and Russell Paulet and Xun Yi}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Secure Two-Party Association Rule Mining}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {15--22}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Kaosar.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/KaosarPY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LacknerT11, author = {G{\"{u}}nther Lackner and Peter Teufl}, editor = {Colin Boyd and Josef Pieprzyk}, title = {{IEEE} 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {41--50}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Lackner.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LacknerT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeWGK11, author = {Van Lam Le and Ian Welch and Xiaoying Gao and Peter Komisarczuk}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Identification of Potential Malicious Web Pages}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {33--40}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Le.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LeWGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/NakamuraIBIY11, author = {Toru Nakamura and Shunsuke Inenaga and Kensuke Baba and Daisuke Ikeda and Hiroto Yasuura}, editor = {Colin Boyd and Josef Pieprzyk}, title = {An Anonymous Authentication Protocol with Single-database {PIR}}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {3--8}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Nakamura.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/NakamuraIBIY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/PalmerBW11, author = {Ben Palmer and Kris Bubendorfer and Ian Welch}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {67--76}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Palmer.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/PalmerBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RiesSP11, author = {Thorsten Ries and Radu State and Andriy Panchenko}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {77--86}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Ries.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RiesSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2011, editor = {Colin Boyd and Josef Pieprzyk}, title = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/Vol116.html}, isbn = {978-1-920682-96-5}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.